651-905-3729 Microsoft Silver Learning Partner EC Counsel Reseller compTIA Authorized Partner

Computer Hacking Forensic Investigator (CHFI) Virtual Classroom Live November 03, 2025

Price: $3,600

This course runs for a duration of 5 Days.

The class will run daily from 8:30 AM ET to 4:30 PM ET.

Class Location: Virtual LIVE Instructor Led - Virtual Live Classroom.

Enroll today to reserve your spot!

Space is limited. Enroll today.

Enroll Now

Description

EC-Council’s CHFI program prepares cybersecurity professionals with the knowledge and skills to perform effective digital forensics investigations and bring their organization into a state of forensic readiness. Establishing the forensics process, lab, evidence handling procedures, and investigation techniques are required to validate/triage incidents and point the incident response teams in the right direction. Forensic readiness is crucial as it can differentiate between a minor incident and a major cyber-attack that brings a company to its knees.

This intense hands-on digital forensics program immerses students in over 68 forensic labs, working on crafted evidence files utilizing the tools of the world’s top digital forensics professionals. Students will go beyond traditional hardware and memory forensics, covering current topics in cloud forensics, mobile and IoT, and investigating web application attacks and malware forensics. The C|HFI presents a methodological approach to computer forensics, including searching and seizing, chain-of-custody, acquisition, preservation, analysis, and reporting of digital evidence. Students learn various forensic investigation techniques and standard forensic tools. As they learn how to acquire and manage evidence through various operating environments, students also learn the chain of custody and legal procedures required to preserve evidence and ensure it is admissible in court, enabling the eventual prosecution of cyber criminals and containing liability on the victim organization.

Course Overview

Computer Forensics in Today’s World

Understand the Fundamentals of Computer Forensics
Understand Cybercrimes and their Investigation Procedures
Understand Digital Evidence and eDiscovery
Understand Forensic Readiness
Understand the Role of Various Processes and Technologies in Computer Forensics
Identify the Roles and Responsibilities of a Forensic Investigator
Understand the Challenges Faced in Investigating Cybercrimes
Understand Various Standards and Best Practices Related to Computer Forensics
Understand Laws and Legal Compliance in Computer Forensics

Computer Forensics Investigation Process

Understand the Forensic Investigation Process and its Importance
Understand First Response
Understand the Pre-investigation Phase
Understand the Investigation Phase
Understand the Post-investigation Phase
Understanding Hard Disks and File Systems
Describe Different Types of Disk Drives and their Characteristics
Explain the Logical Structure of a Disk
Understand the Booting Process of Windows, Linux, and macOS Operating Systems
Understand Various File Systems of Windows, Linux and macOS Operating Systems
Understand File System Analysis
Understand Storage Systems
Understand Encoding Standards and Hex Editors
​Analyze Popular File Formats Using Hex Editor

Data Acquisition and Duplication

Understand Data Acquisition Fundamentals
Understand eDiscovery
Understand Data Acquisition Methodology
Prepare an Image File for Examination
Defeating Anti-forensics Techniques
Understand Anti-forensics Techniques
Discuss Data Deletion and Recycle Bin Forensics
Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions
Explore Password Cracking/Bypassing Techniques
Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch
Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption
Detect Program Packers and Footprint Minimizing Techniques

Windows Forensics

Understand Windows Forensics
Collect Volatile Information
Collect Non-volatile Information
Perform Windows Memory Analysis
Perform Windows Registry Analysis
Perform Electron Application Analysis
​Perform Web Browser Forensics
Examine Windows Files and Metadata
Understand ShellBags, LNK Files, and Jump Lists
​Understand Text-based Logs and Windows Event Logs

Linux and Mac Forensics

Collect Volatile Information in Linux
Collect Non-volatile Information in Linux
Understand Linux Memory Forensics
Understand Mac Forensics
Collect Volatile Information in Mac
Collect Non-volatile Information in Mac
Understand Mac Memory Forensics and Mac Forensics Tools

Network Forensics

Understand Network Forensics
Summarize Event Correlation Concepts
Identify Indicators of Compromise (IoCs) from Network Logs
Investigate Network Traffic
Perform Incident Detection and Examination Using SIEM Tools
Understand Wireless Network Forensics
​Detect and Investigate Wireless Network Attacks

Malware Forensics

Understand Malware Concepts
Understand Malware Forensics
Perform Static Malware Analysis
Analyzing Suspicious Documents
Perform System Behavior Analysis
Perform Network Behavior Analysis
Perform Ransomware Analysis

Investigating Web Attacks

Understand Web Application Forensics
Understand Internet Information Services (IIS) Logs
Understand Apache Web Server Logs
​Detect and Investigate Various Attacks on Web Applications

Dark Web Forensics

Understand the Dark Web and Dark Web Forensics
Determine How to Identify the Traces of Tor Browser during Investigation
​Perform Tor Browser Forensics

Cloud Forensics

Understand Cloud Computing Concepts
Understand Cloud Forensics
Understand Amazon Web Services (AWS) Fundamentals
Perform AWS Forensics
​Understand Microsoft Azure Fundamentals
Perform Microsoft Azure Forensics
Understand Google Cloud Fundamentals
Perform Google Cloud Forensics

Email and Social Media Forensics

Understand Email Basics
Explain Email Crime Investigation and its Steps
Understand U.S. Laws Against Email Crime
​Explain Social Media Forensics

Mobile Forensics

Understand Mobile Device Forensics
Understand Android and iOS Architecture, Boot Process, and File Systems
Understand Mobile Forensics Process
Investigate Cellular Network Data
Perform File System Acquisition
Understand Phone Locks, Rooting, and Jailbreaking of Mobile Devices
Perform Logical Acquisition on Mobile Devices
​Perform Physical Acquisition on Mobile Devices
Perform Android and iOS Forensic Analysis

IoT Forensics

Understand IoT Concepts
​Perform Forensics on IoT Devices

Prerequisites

IT/forensics professionals with basic knowledge of IT/cybersecurity, computer forensics, incident response, and threat vectors.

 

Course Comments

Outlines may vary from Class to class as some are delivered through different parnters

Other Available Dates for this Course

Virtual Classroom Live
December 15, 2025

$2,995.00
  Featured Class 5 Days    8 AM CT - 4 PM CT
view class details and enroll
Virtual Classroom Live
January 19, 2026

$3,600.00
5 Days    8:30 AM ET - 4:30 PM ET
view class details and enroll
Virtual Classroom Live
March 30, 2026

$3,600.00
5 Days    8:30 AM ET - 4:30 PM ET
view class details and enroll